Skip to content

Remove support for obsolete SPKAC format#9242

Closed
richsalz wants to merge 1 commit intoopenssl:masterfrom
richsalz:rm-netscape-spkac
Closed

Remove support for obsolete SPKAC format#9242
richsalz wants to merge 1 commit intoopenssl:masterfrom
richsalz:rm-netscape-spkac

Conversation

@richsalz
Copy link
Contributor

The underlying parsing routines are still present, the commandline
tools and fuzzing were removed.

Netscape and RedHat folks say this is from the old keygen browser tag and should be deprecated.

@kaduk
Copy link
Contributor

kaduk commented Jun 25, 2019

Some people are still using the browser tag and applying workarounds as browsers remove support for it (viz. https://certassist.mit.edu/)

@richsalz
Copy link
Contributor Author

Looking at the certassist website, it claims to generate PKCS12, not SPKAC, so I don't think the comment is relevant here.

@davidben
Copy link
Contributor

I believe it generates both. It generates an SPKAC to talk to a issuer server endpoint, which expects the old keygen tag, to get a certificate. That certificate is wrapped, with the key, in a PKCS#12 blob for OS file handlers to import.

(It's also not using OpenSSL, though I've no idea what the server it talks to does.)

@andersk
Copy link

andersk commented Jun 27, 2019

(CertAssist author here.) @davidben is correct. Additionally, CertAssist has an advanced mode where you paste in the output from the openssl spkac command, for those who want to use CertAssist with a hardware PKCS#11 provider, or who just don’t want to entrust their private key to a webpage. So there are still use cases for this.

I unfortunately have no visibility into the code of the server that CertAssist proxies its SPKAC requests to, but I can try to inquire with my contact at MIT IS&T. My impression is that ~zero developer resources are available to improve it in any way.

@mattcaswell
Copy link
Member

If its still being used (as seems to be the case) it seems premature to remove it.

-1

@richsalz
Copy link
Contributor Author

The OMC can do what it wants, but so far we have one use-case at MIT that has no resources to do any work. That means they don't upgrade to the next release of openssl either, right? Or is certassist used in other places?

@richsalz
Copy link
Contributor Author

So @mattcaswell, the one use-case is abandonware at MIT. Are you keeping your -1/hold?

The underlying parsing routines are still present, the commandline
tools and fuzzing were removed.
@richsalz
Copy link
Contributor Author

This goes against the stated compatibility plans so I'm closing this. If someone wants to recreate for a future release, feel free to adopt the branch. :)

@richsalz richsalz closed this Jul 30, 2019
@richsalz richsalz deleted the rm-netscape-spkac branch July 31, 2019 18:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants